1
WGU
WGU C836 EXAM QUESTIONS AND
ANSWERS UPDATED (2025/2026)
(VERIFIED ANSWERS)
SSL (secure sockets layer) - ANS ✓a protocol that uses the RSA algorithm (an
asymmetric algorithm) to secure web and email traffic
hash function (message digest) - ANS ✓keyless cryptography that creates a
largely unique and fixed-length hash value based on the original message
hash - ANS ✓used to determine whether the message has changed;
provides integrity (but not confidentiality)
digital signature - ANS ✓a method of securing a message that involves
generating a hash and encrypting it using a private key
certificate - ANS ✓created to link a public key to a particular individual;
used as a form of electronic identification for that person
WGU C836
, 2
WGU
CA (certificate authority) - ANS ✓a trusted entity that handles digital
certificates
PKI (public key infrastructure) - ANS ✓infrastructure that includes the CA’s
that issue and verify certificates and the RAs that verify the identity of the
individuals associated with the certificates
RA (registration authority) - ANS ✓An authority in a PKI that verifies the
identity of the individual associated with the certificate
CRL (Certificate Revocation List) - ANS ✓a public list that holds all the revoked
certifications for a certain period of time
data at rest - ANS ✓Data that is on a storage device of some kind and is not
moving
data in motion - ANS ✓Data that is moving over a WAN or LAN, a wireless
network, over the internet, or in other ways
data at rest - ANS ✓This type of data is protected using data security
(encryption) and physical security
WGU C836
, 3
WGU
data in motion - ANS ✓This type of data is best protected by protecting the data
itself (using SSL, TLS) and protecting the connection (using IPsec VPN, SSL VPN)
data in use - ANS ✓This type of data is the hardest to protect
encryption - ANS ✓a subset of cryptography that refers specifically to the
transformation of unencrypted data into its encrypted form
decryption - ANS ✓The process of recovering the plaintext message from the
ciphertext
authentication - ANS ✓a set of methods we use to establish a claim of identity as
being true
corroborates the identity of an entity, whether it is the sender, the sender's
computer, some device, or some information
ECC (Elliptic Curve Cryptography) - ANS ✓An asymmetric encryption
algorithm that uses smaller key sizes and requires less processing power than
many other encryption methods.
commonly used in smaller wireless devices
WGU C836
, 4
WGU
accountability - ANS ✓this provides us with the means to trace activities in our
environment back to their source
nonrepudiation - ANS ✓Refers to a situation in which sufficient evidence exists
as to prevent an individual from successfully denying that he or she has made a
statement, or taken an action
deterrence - ANS ✓refers to elements that discourage or prevent misbehaviour
in our environments
IDS (intrusion detection system) - ANS ✓a monitoring tool that alerts when an
attack or other undesirable activity is taking place
IPS (Intrusion Prevention System) - ANS ✓a tool that alarms and takes actions
when malicious events occur
auditing - ANS ✓a methodical examination and review that ensures
accountability through technical means;
ensures compliance with applicable laws, policies, and other bodies of
administrative control, and detects misuse
WGU C836
WGU
WGU C836 EXAM QUESTIONS AND
ANSWERS UPDATED (2025/2026)
(VERIFIED ANSWERS)
SSL (secure sockets layer) - ANS ✓a protocol that uses the RSA algorithm (an
asymmetric algorithm) to secure web and email traffic
hash function (message digest) - ANS ✓keyless cryptography that creates a
largely unique and fixed-length hash value based on the original message
hash - ANS ✓used to determine whether the message has changed;
provides integrity (but not confidentiality)
digital signature - ANS ✓a method of securing a message that involves
generating a hash and encrypting it using a private key
certificate - ANS ✓created to link a public key to a particular individual;
used as a form of electronic identification for that person
WGU C836
, 2
WGU
CA (certificate authority) - ANS ✓a trusted entity that handles digital
certificates
PKI (public key infrastructure) - ANS ✓infrastructure that includes the CA’s
that issue and verify certificates and the RAs that verify the identity of the
individuals associated with the certificates
RA (registration authority) - ANS ✓An authority in a PKI that verifies the
identity of the individual associated with the certificate
CRL (Certificate Revocation List) - ANS ✓a public list that holds all the revoked
certifications for a certain period of time
data at rest - ANS ✓Data that is on a storage device of some kind and is not
moving
data in motion - ANS ✓Data that is moving over a WAN or LAN, a wireless
network, over the internet, or in other ways
data at rest - ANS ✓This type of data is protected using data security
(encryption) and physical security
WGU C836
, 3
WGU
data in motion - ANS ✓This type of data is best protected by protecting the data
itself (using SSL, TLS) and protecting the connection (using IPsec VPN, SSL VPN)
data in use - ANS ✓This type of data is the hardest to protect
encryption - ANS ✓a subset of cryptography that refers specifically to the
transformation of unencrypted data into its encrypted form
decryption - ANS ✓The process of recovering the plaintext message from the
ciphertext
authentication - ANS ✓a set of methods we use to establish a claim of identity as
being true
corroborates the identity of an entity, whether it is the sender, the sender's
computer, some device, or some information
ECC (Elliptic Curve Cryptography) - ANS ✓An asymmetric encryption
algorithm that uses smaller key sizes and requires less processing power than
many other encryption methods.
commonly used in smaller wireless devices
WGU C836
, 4
WGU
accountability - ANS ✓this provides us with the means to trace activities in our
environment back to their source
nonrepudiation - ANS ✓Refers to a situation in which sufficient evidence exists
as to prevent an individual from successfully denying that he or she has made a
statement, or taken an action
deterrence - ANS ✓refers to elements that discourage or prevent misbehaviour
in our environments
IDS (intrusion detection system) - ANS ✓a monitoring tool that alerts when an
attack or other undesirable activity is taking place
IPS (Intrusion Prevention System) - ANS ✓a tool that alarms and takes actions
when malicious events occur
auditing - ANS ✓a methodical examination and review that ensures
accountability through technical means;
ensures compliance with applicable laws, policies, and other bodies of
administrative control, and detects misuse
WGU C836